Related Content
A Consolidated Payment Card Sounds Convenient—But Is It Secure? Coin is supposed to be a replacement for all the plastic in your wallet. It can store programmed information for eight credit, debit, or store loyalty cards. Sounds pretty convenient, right? However, experts warn the card might not keep your information secure, and it still has issues to work out. |
||
The Latest Software News In this roundup of software-related news that matters to you, read about hackers who are attempting to disrupt GitHub and how a software glitch may have been responsible for delaying emergency help during the summer crash of an Asiana Airlines Boeing 777. |
||
Georgia Tech Issues Report on Emerging Cyber Threats for 2014 At the annual Georgia Tech Cyber Security Summit, cloud data storage, the Internet of Things, and mobile devices were listed as emerging cyber threats for 2014. Pamela Rentz highlights this and other news from the conference. |
||
How Bug Bounty Programs Deliver Savings and Security Bug bounty programs abound these days and have been leveraged by many organizations hoping to reduce their security vulnerabilities. Looking more closely at these bug bounty programs, several questions emerge in helping shape an organization’s quality assurance strategy. |
||
November Security News Roundup In the following roundup of the latest security news, read how a team of researchers from North Carolina State University discovered security flaws in Google's Android OS and how seven popular open source applications and products contain vulnerabilities that hackers could potentially exploit. |
||
What's New in Software News In this roundup of what’s new in interesting software news, read about how a group of developers at San Francisco-based Vicarious created vision-recognition software that can solve CAPTCHAs. Also, news emerged that the recent hacking of Adobe Systems was worse than originally reported. |
||
Security Lapse Discovered in Government Health Care Site It turns out that long wait times and persistent glitches aren’t the worst problems HealthCare.gov has experienced. A cyber security expert discovered that for the first few weeks the site existed, it was fairly easy for someone to hijack a user’s account. It was as easy as guessing a user name. |
||
Ambient Backscatter as Battery Replacement Gaining Public Visibility A new technology that has gained visibility in the past few months is “ambient backscatter”—a method to reuse energy that replaces batteries in providing energy, leveraging existing and nearby energy sources through existing radio frequencies. |